CVE-2025-25467
Published: 18 February 2025
Summary
CVE-2025-25467 is a critical-severity Code Injection (CWE-94) vulnerability in Videolan (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 39.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the CVE by requiring timely identification, reporting, and remediation of the memory management flaw in libx264.
Implements memory protection mechanisms that prevent unauthorized code execution from memory corruption triggered by crafted AAC files.
Enables vulnerability scanning to identify the presence of CVE-2025-25467 in libx264 components for subsequent remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability enables remote arbitrary code execution via a crafted AAC file processed by client applications (e.g., media players or video encoders) using libx264, directly mapping to T1203: Exploitation for Client Execution.
NVD Description
Insufficient tracking and releasing of allocated used memory in libx264 git master allows attackers to execute arbitrary code via creating a crafted AAC file.
Deeper analysisAI
CVE-2025-25467 is a critical memory management vulnerability in the libx264 git master branch, an open-source H.264 video encoding library. The issue stems from insufficient tracking and releasing of allocated used memory, classified under CWE-94 (Improper Control of Generation of Code). Published on 2025-02-18, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for complete system compromise.
Remote attackers require no privileges or user interaction to exploit this flaw. By creating a specially crafted AAC file and inducing a victim to process it through an application using the vulnerable libx264 git master—such as a media player or video encoder—the attacker can trigger the memory handling defect, leading to arbitrary code execution on the target system.
Mitigation details are available in the upstream issue tracker at https://code.videolan.org/videolan/x264/-/issues/75, where practitioners should check for patches or workarounds applicable to affected builds.
Details
- CWE(s)